CN112016526B - Behavior monitoring and analyzing system, method, device and equipment for site activity object - Google Patents

Behavior monitoring and analyzing system, method, device and equipment for site activity object Download PDF

Info

Publication number
CN112016526B
CN112016526B CN202011107137.9A CN202011107137A CN112016526B CN 112016526 B CN112016526 B CN 112016526B CN 202011107137 A CN202011107137 A CN 202011107137A CN 112016526 B CN112016526 B CN 112016526B
Authority
CN
China
Prior art keywords
face image
place
target
activity
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011107137.9A
Other languages
Chinese (zh)
Other versions
CN112016526A (en
Inventor
秦爱民
汤准生
秦雄伟
卢立江
朱婷婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kinth Information Technology Service Co ltd
Original Assignee
Kinth Information Technology Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kinth Information Technology Service Co ltd filed Critical Kinth Information Technology Service Co ltd
Priority to CN202011107137.9A priority Critical patent/CN112016526B/en
Publication of CN112016526A publication Critical patent/CN112016526A/en
Application granted granted Critical
Publication of CN112016526B publication Critical patent/CN112016526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Image Analysis (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a behavior monitoring and analyzing system, method, device and equipment for a place activity object. This application can implement to carry out the action of place activity object secretly and monitor accurately. The scheme includes that image acquisition equipment deployed at a plurality of preset positions of a target place acquires face images of a movable object moving in the target place, the face images are encrypted by the place server and then transmitted to a designated internet server in a one-way mode, the internet server forwards the encrypted face images to an intranet analysis server for analysis, the intranet analysis server performs face image comparison in a place identity library of the target place, if real-name authentication identity information cannot be obtained, the face images are further compared in a global identity library to obtain real-name authentication identity information, and under the condition that the movable object is not a practitioner of the target place, the movable track information of the movable object in the target place and the movable track information of the plurality of places are integrated to judge whether the movable object has preset suspicious behaviors.

Description

Behavior monitoring and analyzing system, method, device and equipment for site activity object
Technical Field
The present application relates to the field of behavior monitoring and analysis technologies, and in particular, to a system, a method, an apparatus, a computer device, and a storage medium for behavior monitoring and analysis of a venue activity object.
Background
With the business requirements brought by the development of information technology and the development of society, real-name registration needs to be carried out on related personnel in places such as hotels, KTVs and the like required by public security management so as to conveniently supervise the behaviors of moving objects in the places.
The technical solution provided by the conventional technology is generally to deploy devices such as a second-generation identification card reader and a personal identification card all-in-one machine in places such as hotels and KTVs, so as to allow relevant people to register for real names. However, such places generally have the characteristics of dense people flow and complex environment, so that it is difficult for a manager in the place to ensure that each moving object can be actively registered, and the behavior information of the moving object cannot be accurately monitored only by the actively registered information, which causes a technical problem of low accuracy in monitoring the behavior of the moving object in the place.
Disclosure of Invention
In view of the above, there is a need to provide a system, a method, an apparatus, a computer device and a storage medium for behavior monitoring and analyzing of venue activity objects.
A system for behavioral monitoring and analysis of venue activity objects, the system comprising: the system comprises image acquisition equipment, a site server, an Internet server and an intranet analysis server, wherein the image acquisition equipment, the site server, the Internet server and the intranet analysis server are deployed at a plurality of preset positions of a target site; wherein the content of the first and second substances,
the image acquisition equipment is used for acquiring first face images of moving objects moving in the target place in real time at the plurality of preset positions and transmitting the first face images to the place server;
the place server is used for encrypting the first face image and transmitting the encrypted first face image to the internet server in a one-way mode;
the internet server is used for forwarding the encrypted first face image to the intranet analysis server;
the intranet analysis server is used for receiving the encrypted first face image from the internet server with the specified internet protocol address and comparing the decrypted first face image with a second face image in a prestored place identity library of the target place to obtain a first comparison result;
the intranet analysis server is further configured to compare the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result if the first comparison result represents that the identity acquisition fails, and acquire real-name authentication identity information for the moving object according to the second comparison result;
the intranet analysis server is further configured to obtain the real-name authentication identity information for the active object according to the first comparison result if the first comparison result represents that identity obtaining is successful;
the intranet analysis server is further configured to, when the real-name authentication identity information indicates that the moving object is not a practitioner of the target place, obtain multi-place moving track information of the moving object based on the real-name authentication identity information, and determine whether the moving object has a preset suspicious behavior according to the basic moving track information of the moving object in the target place and the multi-place moving track information.
A behavior monitoring and analyzing method of a place activity object is applied to an intranet analysis server, and comprises the following steps:
receiving an encrypted first face image from an internet server specifying an internet protocol address; the encrypted first face image is transmitted to the Internet server in a one-way mode after being encrypted by the place server; the place server is used for receiving first face images of moving objects moving in a target place, which are acquired in real time by image acquisition equipment from the image acquisition equipment deployed at a plurality of preset positions of the target place;
comparing the decrypted first face image with a second face image in a pre-stored place identity library of the target place to obtain a first comparison result;
if the first comparison result represents that the identity acquisition fails, comparing the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result, and acquiring real-name authentication identity information aiming at the moving object according to the second comparison result;
if the first comparison result represents that the identity is successfully acquired, acquiring the real-name authentication identity information aiming at the movable object according to the first comparison result;
and under the condition that the real-name authentication identity information represents that the movable object is not a practitioner of the target place, acquiring multi-place activity track information of the movable object based on the real-name authentication identity information, and judging whether the movable object has preset suspicious behaviors or not according to the basic activity track information of the movable object in the target place and the multi-place activity track information.
A behavior monitoring and analysis device for venue activity objects, comprising:
the face image receiving module is used for receiving the encrypted first face image from an Internet server of a specified Internet protocol address; the encrypted first face image is transmitted to the Internet server in a one-way mode after being encrypted by the place server; the place server is used for receiving first face images of moving objects moving in a target place, which are acquired in real time by image acquisition equipment from the image acquisition equipment deployed at a plurality of preset positions of the target place;
the face image comparison module is used for comparing the first face image obtained by decryption with a second face image in a pre-stored place identity library of the target place to obtain a first comparison result;
the first comparison result processing module is used for comparing the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result if the first comparison result represents that the identity acquisition fails, and acquiring real-name authentication identity information aiming at the moving object according to the second comparison result;
the second comparison result processing module is used for acquiring the real-name authentication identity information aiming at the movable object according to the first comparison result if the first comparison result represents that the identity is successfully acquired;
and the behavior judgment module is used for acquiring multi-place activity track information of the activity object based on the real-name authentication identity information under the condition that the real-name authentication identity information represents that the activity object is not an practitioner of the target place, and judging whether the activity object has preset suspicious behaviors or not according to the basic activity track information of the activity object in the target place and the multi-place activity track information.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving an encrypted first face image from an internet server specifying an internet protocol address; the encrypted first face image is transmitted to the Internet server in a one-way mode after being encrypted by the place server; the place server is used for receiving first face images of moving objects moving in a target place, which are acquired in real time by image acquisition equipment from the image acquisition equipment deployed at a plurality of preset positions of the target place; comparing the decrypted first face image with a second face image in a pre-stored place identity library of the target place to obtain a first comparison result; if the first comparison result represents that the identity acquisition fails, comparing the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result, and acquiring real-name authentication identity information aiming at the moving object according to the second comparison result; if the first comparison result represents that the identity is successfully acquired, acquiring the real-name authentication identity information aiming at the movable object according to the first comparison result; and under the condition that the real-name authentication identity information represents that the movable object is not a practitioner of the target place, acquiring multi-place activity track information of the movable object based on the real-name authentication identity information, and judging whether the movable object has preset suspicious behaviors or not according to the basic activity track information of the movable object in the target place and the multi-place activity track information.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving an encrypted first face image from an internet server specifying an internet protocol address; the encrypted first face image is transmitted to the Internet server in a one-way mode after being encrypted by the place server; the place server is used for receiving first face images of moving objects moving in a target place, which are acquired in real time by image acquisition equipment from the image acquisition equipment deployed at a plurality of preset positions of the target place; comparing the decrypted first face image with a second face image in a pre-stored place identity library of the target place to obtain a first comparison result; if the first comparison result represents that the identity acquisition fails, comparing the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result, and acquiring real-name authentication identity information aiming at the moving object according to the second comparison result; if the first comparison result represents that the identity is successfully acquired, acquiring the real-name authentication identity information aiming at the movable object according to the first comparison result; and under the condition that the real-name authentication identity information represents that the movable object is not a practitioner of the target place, acquiring multi-place activity track information of the movable object based on the real-name authentication identity information, and judging whether the movable object has preset suspicious behaviors or not according to the basic activity track information of the movable object in the target place and the multi-place activity track information.
The system, the method, the device, the computer equipment and the storage medium for monitoring and analyzing the behaviors of the place moving objects can acquire a first human face image of the moving object moving in a target place by image acquisition equipment deployed at a plurality of preset positions of the target place, transmit the first human face image to an Internet server with a specified Internet protocol address in a one-way mode through encryption of the place server, transmit the first human face image to an intranet analysis server by the Internet server with the specified Internet protocol address for analysis, enable the whole analysis process to be carried out in an intranet, enable the information to be confidential and have high safety, enable the intranet analysis server to pre-store a large number of human face image resources, compare the human face images in a place identity library of the target place firstly, and further compare the human face images in a global identity library to obtain real-name authentication identity information of the moving object if the real-name authentication identity information cannot be obtained at the moment, and under the condition that the movable object is not a practitioner of a target place, the movable track information of the movable object in the target place and the movable track information of multiple places are integrated to judge whether the movable object has a preset suspicious behavior, so that the identity information of the movable object is obtained through the comparative analysis of multiple face image libraries, and a related movable track is further obtained to carry out secret and accurate monitoring on the movable object with the suspicious movable track.
Drawings
FIG. 1 is a schematic diagram of a behavior monitoring analysis system for venue activity objects, according to one embodiment;
FIG. 2 is a schematic flow chart diagram illustrating a method for behavior monitoring and analysis of venue activity objects, according to one embodiment;
FIG. 3 is a flowchart illustrating steps for determining whether a predetermined suspicious activity exists for the active object in one embodiment;
FIG. 4 is a block diagram of an embodiment of a behavior monitoring and analyzing device for venue activity objects;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In one embodiment, the present application provides a behavior monitoring and analyzing system for a live object, which may include an image capturing device deployed at a plurality of preset locations of a target site, a site server, an internet server, and an intranet analysis server, as shown in fig. 1. The present application further provides a method for monitoring and analyzing behaviors of a venue activity object in some embodiments, where the method for monitoring and analyzing behaviors of a venue activity object can be applied to the intranet analysis server in fig. 1 to monitor and analyze behaviors of a venue activity object.
The monitoring and analyzing system shown in fig. 1 is described, specifically, the image capturing device may be in communication connection with a location server, where the location server refers to a server of a target location, where the target location may be a location such as a hotel, a KTV, and a bar, and the image capturing device may be deployed at a plurality of preset locations such as a foreground, a corner of a corridor, and the like of each location, and is configured to capture a first face image of a moving object moving in the target location at the preset locations in real time, and transmit the first face image to the location server; wherein, the active object generally refers to various persons that are active in the target place.
After receiving the first face image sent by the image acquisition equipment, the place server encrypts the first face image to obtain an encrypted first face image, and transmits the encrypted first face image to the internet server in a one-way mode. The internet server can only receive the encrypted data from the place server, the place server unidirectionally transmits the encrypted data to the internet server, and the internet server cannot transmit the data to the place server, so that the safety of data processing is ensured.
Then, after receiving the encrypted first face images transmitted unidirectionally by the location server, the internet server forwards the encrypted first face images to the intranet analysis server, where the internet server cannot store the encrypted first face images.
The intranet analysis server is used for receiving the encrypted first face image sent by the intranet analysis server from the internet server with the specified internet protocol address. That is, the internet protocol address of the internet server that can transmit the encrypted data to the intranet analysis server is specified by the intranet analysis server, whereby the security of data processing in the process from the site server to the internet server and then to the intranet analysis server can be ensured.
And then the intranet analysis server decrypts the received encrypted first face image to obtain a first face image, and compares the first face image with a second face image in a prestored place identity library of the target place to obtain a first comparison result. The location identity library of the target location is a location identity library constructed for the target location, the location identity library includes identity libraries of employees of the target location and various kinds of people who have been registered with real names at the target location, and information included in the location identity library may include location numbers, location names, whether people have been registered, whether people are employees, certificate numbers, names, genders, ages, face images, and the like.
Specifically, the intranet analysis server compares the first face image with a second face image in a place identity library to obtain a first comparison result, and if the first comparison result represents that the identity acquisition fails, it indicates that a person corresponding to the first face image cannot be found in the place identity library, and may preliminarily indicate that the person corresponding to the first face image is not a practitioner or a registered person in the target place. On the basis, the intranet analysis server further compares the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result. The intranet analysis server also prestores a global identity library, the global identity library comprises real-name authentication identity information of all the persons and face images corresponding to the real-name authentication identity information, which can be acquired by the intranet analysis server, a second comparison result can be obtained after the first face image is compared with the third face image, the real-name authentication identity information matched with the first face image in the global identity library can be locked according to the second comparison result, the intranet analysis server takes the real-name authentication identity information as the real-name authentication identity information aiming at the moving object, and the real-name authentication identity information can comprise information such as certificate numbers, names, sexes, ages and the like.
In addition, if the first comparison result represents that the identity acquisition is successful, the intranet analysis server may acquire real-name authentication identity information for the active object according to the first comparison result, that is, if the active object can be found in the site identity library, the real-name authentication identity information recorded for the active object by the target site may also be acquired.
Further, the intranet analysis server is further configured to, when the real-name authentication identity information indicates that the moving object is not a practitioner in the target place, obtain multi-place moving trajectory information of the moving object based on the real-name authentication identity information, and determine whether the moving object has a preset suspicious behavior according to the basic moving trajectory information of the moving object in the target place and the multi-place moving trajectory information.
Specifically, if the active object can be found in the site identity library, it indicates that the active object may be a practitioner of the target site or a registered entrance, and for the practitioner, the activity behavior thereof may not be monitored and analyzed generally; if the movable object can only be found in the global identity library, the intranet analysis server can further perform matching from the real-name authentication identity information contained in the place identity library according to the obtained real-name authentication identity information so as to avoid judgment errors caused by errors generated in the image comparison process, and if the movable object cannot be found from the place identity library according to the real-name authentication identity information, the movable object is not a practitioner of the target place or a registered entrance person. After judging that the movable object does not belong to the practitioner of the target location, the intranet analysis server can acquire the activity track information of the movable object at other locations as the multi-location activity track information according to the real-name authentication identity information, and acquiring the activity track information of the activity object at the target place as basic activity track information, judging whether the moving object has preset suspicious behaviors according to the basic moving track information and the multi-place moving track information, it can be determined whether the moving object stays in the target place for a long time without registration for example from the basic moving trajectory information, whether the moving object frequently appears in a plurality of sensitive places or not can be judged according to the multi-place moving track information, and judging whether the movable object has some preset suspicious behaviors according to the activity track information.
The behavior monitoring and analyzing system of the place moving object can acquire a first human face image of the moving object moving in a target place by image acquisition equipment deployed at a plurality of preset positions of the target place, and transmit the first human face image to an Internet server with a specified Internet protocol address in a one-way mode through encryption of the place server, the Internet server with the specified Internet protocol address forwards the first human face image to an intranet analysis server for analysis, so that the whole analysis process is carried out in an intranet, the information can be kept secret and has high safety, the intranet analysis server can pre-store a large number of human face image resources, human face image comparison is carried out in a place identity library of the target place firstly, if the real-name authentication identity information cannot be obtained at the moment, comparison is further carried out in a global identity library to obtain the real-name authentication identity information of the moving object, and under the condition that the moving object is not a practitioner of the target place, and the movement track information of the movable object in the target place and the movement track information of multiple places are integrated to judge whether the movable object has preset suspicious behaviors, so that the identity information of the movable object is obtained through the comparative analysis of a plurality of face image libraries, and then the related movement track is obtained to implement the secret and accurate monitoring on the movable object with suspicious movement track.
In an embodiment, in the first face image transmission process, the location server is further configured to process the first face image into first face images at multiple preset resolutions, encrypt the first face images at the multiple preset resolutions, and transmit the first face images to the multiple internet servers specifying internet protocol addresses in a unidirectional manner, so that the multiple internet servers specifying internet protocol addresses each receive the encrypted first face image at one of the preset resolutions.
Specifically, in order to accurately identify the moving object in a relatively timely manner, the location server may process the first face image into first face images at a plurality of predetermined resolutions, for example, the first face image is processed into a first face image under three preset resolutions of high, medium and low, the first face image with low resolution can be generally transmitted to the intranet analysis server for analysis faster, the first face image with high resolution generally can ensure accurate identification of the moving object, the place server encrypts the first face images with three resolutions and sends the encrypted first face images to three different internet servers with specified internet protocol addresses, each internet server receives the first face image with one of the resolutions, and then each internet server is used for forwarding the received encrypted first face image under the corresponding preset resolution to the intranet analysis server.
Due to the network transmission environment, the intranet analysis server may receive the encrypted first face image at the corresponding preset resolution from different internet servers at different times. In this regard, the intranet analysis server is further configured to use a preset resolution corresponding to the encrypted first face image received first from the plurality of internet servers with the specified internet protocol addresses as the target preset resolution.
Then, under the condition that the intranet analysis server compares the face images in the place identity library, extracting second face images under the target preset resolution from prestored second face images under multiple preset resolutions, and when the intranet analysis server does not receive a first face image with a preset resolution higher than the target preset resolution from the internet server of the specified internet protocol address within a first preset time period, comparing the second face image under the target preset resolution with the first face image under the target preset resolution by the intranet analysis server to obtain a first comparison result. And if the first face image with the preset resolution higher than the target preset resolution is received in the first preset time period, comparing the first face image in the place identity library by taking the higher preset resolution as the target preset resolution again so as to accurately identify the moving object under the relatively timely condition.
In addition, under the condition that the intranet analysis server compares the face images in the global identity library, a third face image under the target preset resolution is extracted from prestored third face images under various preset resolutions, and when the intranet analysis server does not receive a first face image with a preset resolution higher than the target preset resolution from an internet server of a specified internet protocol address within a second preset time period, the third face image under the target preset resolution is compared with the first face image under the target preset resolution to obtain a second comparison result. And if the first face image with the preset resolution higher than the target preset resolution is received in the second preset time period, similarly, the first face image is compared in the global identity library by taking the higher preset resolution as the target preset resolution again so as to accurately identify the moving object under the relatively timely condition.
In some embodiments, in the process of analyzing the behavior of the active object, the intranet analysis server is further configured to generate an active trajectory graph of the active object according to the basic active trajectory information of the active object and the multi-place active trajectory information, and perform similarity analysis on the active trajectory graph and a pre-constructed active trajectory reference graph library; the activity track reference graph library may include a plurality of activity track reference graphs corresponding to a plurality of suspicious behaviors, that is, the intranet analysis server may draw or construct a plurality of activity track graphs as the activity track reference graphs in advance according to the plurality of suspicious behaviors. And if the similarity analysis result represents that an activity track reference graph similar to the activity track graph of the activity object exists in the activity track reference graph library, identifying that the activity object has suspicious behaviors corresponding to the activity track reference graph. Illustratively, if the activity trace map of an activity object indicates that the activity object first appears in the location a, then appears in the location B and the location C continuously, and finally returns to the location a, and the activity trace also exists in the activity trace reference map, the intranet analysis server determines that the activity object has suspicious behavior corresponding to the activity trace reference map, and if another activity object also has the same activity trace, the two activity objects can be further identified as suspicious community members. According to the embodiment, whether the activity object has suspicious behaviors or not can be efficiently and accurately judged through comparison of the activity track diagrams.
In some embodiments, the intranet analysis server may be further configured to, when it is detected that a plurality of active objects entering the target location within the third preset time period include only one registered entrance person of the target location, identify the plurality of active objects as an abnormal entrance activity group.
By adopting the technical scheme provided by the embodiment, whether a condition that a plurality of registered persons live in can be identified. Specifically, if the intranet analysis server detects that there are a plurality of moving objects entering a target place such as a hotel within, for example, ten minutes (within a third preset time period), but only one of the moving objects is a registered entrance person (registered entrance person of the target place) of the target place, the intranet analysis server may determine that the moving object belongs to a case where a registered plurality of persons enter the target place, and identify the moving objects as an abnormal entrance moving group.
In some other embodiments, the intranet analysis server may be further configured to identify the moving object as an abnormal moving object when a registered person is detected that the moving object is a target location, and a moving track of the moving object in the target location is not monitored in a period of time in which the moving object is registered that is supposed to be present.
By adopting the technical scheme of the embodiment, whether the situation that a person registers other people to live in can be identified. Specifically, if the intranet analysis server detects that the moving object is a registered person who enters the target location, the intranet analysis server may further obtain a period of time when the moving object is registered in the target location (for example, the moving object enters the target location at night and leaves the target location in the morning), and if the intranet analysis server further detects that the moving object does not appear in the target location at the period of time when the moving object is present, the intranet analysis server may determine that the moving object is a registered person who enters the target location, and identify the moving object as an abnormal moving object.
In an embodiment, a method for monitoring and analyzing behaviors of a venue activity object is provided, and the method for monitoring and analyzing behaviors of a venue activity object may be applied to the intranet analysis server in fig. 1 to monitor and analyze the behaviors of the venue activity object, as shown in fig. 2, and specifically includes the following steps:
in step S201, the intranet analysis server receives the encrypted first face image from the internet server with the specified internet protocol address.
The encrypted first face image is encrypted by the place server and then transmitted to the internet server in a one-way mode, and the place server is used for receiving the first face image of the moving object moving in the target place, acquired in real time by the image acquisition equipment, from the image acquisition equipment deployed at a plurality of preset positions of the target place.
Step S202, the intranet analysis server compares the first face image obtained by decryption with a second face image in a pre-stored site identity library of a target site to obtain a first comparison result;
step S203, if the first comparison result represents that the identity acquisition fails, the intranet analysis server compares the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result, and acquires real-name authentication identity information for the moving object according to the second comparison result;
step S204, if the first comparison result represents that the identity is successfully obtained, the intranet analysis server obtains real-name authentication identity information aiming at the movable object according to the first comparison result;
step S205, in the case that the real-name authentication identity information indicates that the mobile object is not a practitioner in the target location, the intranet analysis server obtains multi-location activity track information of the mobile object based on the real-name authentication identity information, and determines whether the mobile object has a preset suspicious behavior according to the basic activity track information of the mobile object in the target location and the multi-location activity track information.
According to the method, the intranet analysis server can judge whether the moving object has the preset suspicious behavior or not by integrating the moving track information of the moving object in the target place and the moving track information of multiple places, so that the identity information of the moving object is obtained through the comparative analysis of a plurality of face image libraries, and then the related moving track is obtained to implement the secret and accurate monitoring on the moving object with the suspicious moving track.
In an embodiment, during the transmission of the first face image, the location server may be further configured to process the first face image into first face images at multiple preset resolutions, encrypt the first face images at the multiple preset resolutions, and transmit the first face images to multiple internet servers specifying internet protocol addresses in a unidirectional manner, respectively, so that the multiple internet servers specifying internet protocol addresses each receive the encrypted first face image at one of the preset resolutions; the internet server may be further configured to forward the received encrypted first face image at the corresponding preset resolution to the intranet analysis server.
Based on this, when the intranet analysis server receives the first face image, the method may further include the following steps: and the intranet analysis server takes a preset resolution corresponding to the encrypted first face image which is received from the internet servers with the specified internet protocol addresses firstly as a target preset resolution.
Further, the step S202 further includes: the intranet analysis server extracts a second face image under the target preset resolution from prestored second face images under various preset resolutions, and when the intranet analysis server does not receive a first face image with a preset resolution higher than the target preset resolution from an internet server of a specified internet protocol address within a first preset time period, the intranet analysis server compares the second face image under the target preset resolution with the first face image under the target preset resolution to obtain a first comparison result. If the intranet analysis server receives a first face image with a preset resolution higher than the target preset resolution in a first preset time period, the intranet analysis server compares the first face image with the higher preset resolution as the target preset resolution in the place identity library again so as to accurately identify the moving object in a relatively timely manner.
Further, the step S203 further includes: the intranet analysis server extracts a third face image under the target preset resolution from prestored third face images under various preset resolutions, and when the intranet analysis server does not receive a first face image with a preset resolution higher than the target preset resolution from an internet server of a specified internet protocol address within a second preset time period, the intranet analysis server compares the third face image under the target preset resolution with the first face image under the target preset resolution to obtain a second comparison result. If the intranet analysis server receives a first face image with a preset resolution higher than the target preset resolution in a second preset time period, the intranet analysis server compares the first face image with the higher preset resolution as the target preset resolution in the global identity library again so as to accurately identify the moving object in a relatively timely manner.
In an embodiment, as shown in fig. 3, the step S205 further includes:
step S301, generating an activity track graph of an activity object by an intranet analysis server according to basic activity track information and multi-place activity track information;
step S302, the intranet analysis server carries out similarity analysis on the activity track graph and a pre-constructed activity track reference graph library;
the activity track reference map library comprises a plurality of activity track reference maps corresponding to a plurality of suspicious behaviors; that is, the intranet analysis server may draw or construct a plurality of activity trace graphs as the activity trace reference graph in advance according to a plurality of suspicious behaviors.
Step S303, if the similarity analysis result represents that an activity track reference graph similar to the activity track graph exists in the activity track reference graph library, the intranet analysis server identifies that the activity object has suspicious behaviors corresponding to the activity track reference graph.
Illustratively, if the activity trace map of an activity object indicates that the activity object first appears in the location a, then appears in the location B and the location C continuously, and finally returns to the location a, and the activity trace also exists in the activity trace reference map, the intranet analysis server determines that the activity object has suspicious behavior corresponding to the activity trace reference map, and if another activity object also has the same activity trace, the two activity objects can be further identified as suspicious community members.
In this embodiment, the intranet analysis server can efficiently and accurately determine whether the active object has suspicious behaviors by comparing the active trace graphs.
In some embodiments, the method may further include the steps of:
when the intranet analysis server detects that the plurality of movable objects entering the target place within the third preset time period include a plurality of registered entrance persons of only one target place, the intranet analysis server identifies the plurality of movable objects as an abnormal entrance activity group.
By adopting the technical scheme provided by the embodiment, the intranet analysis server can identify whether the situation that a plurality of registered persons live in is existed or not. Specifically, if the intranet analysis server detects that there are a plurality of moving objects entering a target place such as a hotel within, for example, ten minutes (within a third preset time period), but only one of the moving objects is a registered entrance person (registered entrance person of the target place) of the target place, the intranet analysis server may determine that the moving object belongs to a case where a registered plurality of persons enter the target place, and identify the moving objects as an abnormal entrance moving group.
In some other embodiments, the method may further include the steps of:
when the intranet analysis server detects that the moving object is a registered entrance person in the target place and the moving track of the moving object in the target place is not monitored in the time period when the moving object is registered to be in the place, the intranet analysis server identifies the moving object as an abnormal moving object.
By adopting the technical scheme of the embodiment, the intranet analysis server can identify whether the situation that the user registers other people to live in exists. Specifically, if the intranet analysis server detects that the moving object is a registered person who enters the target location, the intranet analysis server may further obtain a period of time when the moving object is registered in the target location (for example, the moving object enters the target location at night and leaves the target location in the morning), and if the intranet analysis server further detects that the moving object does not appear in the target location at the period of time when the moving object is present, the intranet analysis server may determine that the moving object is a registered person who enters the target location, and identify the moving object as an abnormal moving object.
It should be understood that although the steps in the flowcharts of fig. 2 and 3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2 and 3 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 4, a behavior monitoring and analyzing apparatus for venue activity objects is provided, the apparatus 400 may include:
a face image receiving module 401, configured to receive an encrypted first face image from an internet server with a specified internet protocol address; the encrypted first face image is transmitted to the Internet server in a one-way mode after being encrypted by the place server; the place server is used for receiving first face images of moving objects moving in a target place, which are acquired in real time by image acquisition equipment from the image acquisition equipment deployed at a plurality of preset positions of the target place;
a face image comparison module 402, configured to compare the decrypted first face image with a second face image in a pre-stored location identity library of the target location to obtain a first comparison result;
the first comparison result processing module 403 is configured to, if the first comparison result represents that identity acquisition fails, compare the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result, and acquire real-name authentication identity information for the moving object according to the second comparison result;
a second comparison result processing module 404, configured to, if the first comparison result represents that identity obtaining is successful, obtain, according to the first comparison result, the real-name authentication identity information for the moving object;
a behavior determining module 405, configured to, when the real-name authentication identity information indicates that the moving object is not an employee of the target location, obtain multi-location moving trajectory information of the moving object based on the real-name authentication identity information, and determine whether the moving object has a preset suspicious behavior according to the basic moving trajectory information of the moving object in the target location and the multi-location moving trajectory information.
In one embodiment, the apparatus 400 may further include: the resolution determination unit is used for taking a preset resolution corresponding to the encrypted first face image which is received firstly from a plurality of internet servers with specified internet protocol addresses as a target preset resolution; the face image comparison module 402 is further configured to extract a second face image at the target preset resolution from second face images prestored under multiple preset resolutions, and compare the second face image at the target preset resolution with the first face image at the target preset resolution to obtain the first comparison result when a first face image with a preset resolution higher than the target preset resolution is not received from the internet server of the specified internet protocol address within a first preset time period; the first comparison result processing module 403 is further configured to extract a third face image at the target preset resolution from prestored third face images at multiple preset resolutions, and compare the third face image at the target preset resolution with the first face image at the target preset resolution to obtain the second comparison result when a first face image with a preset resolution higher than the target preset resolution is not received from the internet server of the specified internet protocol address within a second preset time period; wherein the content of the first and second substances,
the place server is further configured to process the first face image into first face images at multiple preset resolutions, encrypt the first face images at the multiple preset resolutions, and transmit the encrypted first face images to the internet servers with the multiple specified internet protocol addresses in a one-way manner, so that the internet servers with the multiple specified internet protocol addresses each receive the encrypted first face image at one of the preset resolutions; the internet server is further configured to forward the received encrypted first face image at the corresponding preset resolution to the intranet analysis server.
In one embodiment, the behavior determining module 405 is further configured to generate an activity trace map of the activity object according to the basic activity trace information and the multi-location activity trace information; carrying out similarity analysis on the activity track graph and a pre-constructed activity track reference graph library; the activity track reference map library comprises a plurality of activity track reference maps corresponding to a plurality of suspicious behaviors; and if the similarity analysis result represents that an activity track reference graph similar to the activity track graph exists in the activity track reference graph library, identifying that the activity object has suspicious behaviors corresponding to the activity track reference graph.
In one embodiment, the apparatus 400 may further include:
the moving object processing unit is used for identifying a plurality of moving objects as abnormal entering moving groups when detecting that the moving objects entering the target place in a third preset time period contain a plurality of moving objects and only one registered entering person of the target place is contained in the plurality of moving objects; when the movable object is detected to be a registered entrance person of the target place and the activity track of the movable object in the target place is not monitored in the time period when the movable object is registered, the movable object is identified as an abnormal movable object.
For the specific limitations of the behavior monitoring and analyzing device for the venue activity object, reference may be made to the above limitations of the behavior monitoring and analyzing method for the venue activity object, which are not described herein again. All or part of the modules in the behavior monitoring and analyzing device for the venue activity object can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer equipment is used for storing data such as a first face image, a second face image, a third face image, real-name authentication identity information and the like. The network interface of the computer device is used for communicating with an external device through a network connection. The computer program is executed by a processor to implement a method of behavioral monitoring analysis of a venue activity object.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A system for behavioral monitoring and analysis of venue activity objects, the system comprising: the system comprises image acquisition equipment, a site server, an Internet server and an intranet analysis server, wherein the image acquisition equipment, the site server, the Internet server and the intranet analysis server are deployed at a plurality of preset positions of a target site; wherein the content of the first and second substances,
the image acquisition equipment is used for acquiring first face images of moving objects moving in the target place in real time at the plurality of preset positions and transmitting the first face images to the place server;
the place server is used for encrypting the first face image and transmitting the encrypted first face image to the internet server in a one-way mode;
the internet server is used for forwarding the encrypted first face image to the intranet analysis server;
the intranet analysis server is used for receiving the encrypted first face image from the internet server with the specified internet protocol address and comparing the decrypted first face image with a second face image in a prestored place identity library of the target place to obtain a first comparison result;
the intranet analysis server is further configured to compare the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result if the first comparison result represents that the identity acquisition fails, and acquire real-name authentication identity information for the moving object according to the second comparison result;
the intranet analysis server is further configured to obtain the real-name authentication identity information for the active object according to the first comparison result if the first comparison result represents that identity obtaining is successful;
the intranet analysis server is further configured to, when the real-name authentication identity information indicates that the moving object is not a practitioner of the target place, obtain multi-place moving track information of the moving object based on the real-name authentication identity information, and determine whether the moving object has a preset suspicious behavior according to the basic moving track information of the moving object in the target place and the multi-place moving track information.
2. The system of claim 1,
the place server is further configured to process the first face image into first face images at multiple preset resolutions, encrypt the first face images at the multiple preset resolutions, and transmit the encrypted first face images to multiple internet servers with specified internet protocol addresses in a one-way manner, so that the internet servers with the specified internet protocol addresses each receive the encrypted first face image at one of the preset resolutions;
the internet server is further configured to forward the received encrypted first face image at the corresponding preset resolution to the intranet analysis server;
the intranet analysis server is further configured to use a preset resolution corresponding to the encrypted first face image received first from the internet servers with the multiple specified internet protocol addresses as a target preset resolution;
the intranet analysis server is further configured to extract a second face image at the target preset resolution from second face images at multiple preset resolutions in advance under the condition of performing face image comparison in the place identity library, and compare the second face image at the target preset resolution with the first face image at the target preset resolution to obtain a first comparison result when a first face image with a preset resolution higher than the target preset resolution is not received from the internet server of the specified internet protocol address within a first preset time period;
the intranet analysis server is further configured to extract a third face image at the target preset resolution from prestored third face images at multiple preset resolutions under the condition of face image comparison in the global identity library, and compare the third face image at the target preset resolution with the first face image at the target preset resolution to obtain a second comparison result when the first face image at the target preset resolution is not received from the internet server at the specified internet protocol address within a second preset time period.
3. The system of claim 1,
the intranet analysis server is further configured to generate an activity trace graph of the activity object according to the basic activity trace information and the multi-place activity trace information, and perform similarity analysis on the activity trace graph and a pre-constructed activity trace reference graph library; the activity track reference map library comprises a plurality of activity track reference maps corresponding to a plurality of suspicious behaviors;
the intranet analysis server is further configured to identify that the activity object has suspicious behavior corresponding to the activity track reference map if the similarity analysis result represents that the activity track reference map similar to the activity track map exists in the activity track reference map library.
4. The system according to any one of claims 1 to 3,
the intranet analysis server is further used for identifying a plurality of activity objects as abnormal entrance activity groups when detecting that the activity objects entering the target place within a third preset time period include a plurality of activity objects and only one registered entrance person of the target place is included in the plurality of activity objects;
the intranet analysis server is further configured to identify the moving object as an abnormal moving object when it is detected that the moving object is a registered person who enters the target place and the moving track of the moving object in the target place is not monitored in the time period in which the moving object is registered and should be present.
5. A behavior monitoring and analyzing method for a place activity object is applied to an intranet analysis server, and comprises the following steps:
receiving an encrypted first face image from an internet server specifying an internet protocol address; the encrypted first face image is transmitted to the Internet server in a one-way mode after being encrypted by the place server; the place server is used for receiving first face images of moving objects moving in a target place, which are acquired in real time by image acquisition equipment from the image acquisition equipment deployed at a plurality of preset positions of the target place;
comparing the decrypted first face image with a second face image in a pre-stored place identity library of the target place to obtain a first comparison result;
if the first comparison result represents that the identity acquisition fails, comparing the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result, and acquiring real-name authentication identity information aiming at the moving object according to the second comparison result;
if the first comparison result represents that the identity is successfully acquired, acquiring the real-name authentication identity information aiming at the movable object according to the first comparison result;
and under the condition that the real-name authentication identity information represents that the movable object is not a practitioner of the target place, acquiring multi-place activity track information of the movable object based on the real-name authentication identity information, and judging whether the movable object has preset suspicious behaviors or not according to the basic activity track information of the movable object in the target place and the multi-place activity track information.
6. The method of claim 5,
the method further comprises the following steps:
taking a preset resolution corresponding to an encrypted first face image which is received from a plurality of internet servers with specified internet protocol addresses as a target preset resolution;
the step of comparing the decrypted first face image with a second face image in a pre-stored place identity library of the target place to obtain a first comparison result includes:
extracting second face images under the target preset resolution from second face images under multiple preset resolutions, and comparing the second face images under the target preset resolution with the first face images under the target preset resolution to obtain a first comparison result when the first face images with higher preset resolution than the target preset resolution are not received from the Internet server of the specified Internet protocol address within a first preset time period;
the comparing the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result comprises:
extracting a third face image under the target preset resolution from prestored third face images under various preset resolutions, and comparing the third face image under the target preset resolution with the first face image under the target preset resolution to obtain a second comparison result when the first face image with higher preset resolution than the target preset resolution is not received from the Internet server of the specified Internet protocol address within a second preset time period;
the place server is further configured to process the first face image into first face images at multiple preset resolutions, encrypt the first face images at the multiple preset resolutions, and transmit the encrypted first face images to the internet servers of the multiple specified internet protocol addresses in a one-way manner, so that the internet servers of the multiple specified internet protocol addresses each receive the encrypted first face image at one of the preset resolutions; the internet server is further configured to forward the received encrypted first face image at the corresponding preset resolution to the intranet analysis server.
7. The method according to claim 5, wherein the determining whether the moving object has a preset suspicious behavior according to the basic moving track information and the multi-location moving track information of the moving object at the target location comprises:
generating a movement track graph of the movement object according to the basic movement track information and the multi-place movement track information;
carrying out similarity analysis on the activity track graph and a pre-constructed activity track reference graph library; the activity track reference map library comprises a plurality of activity track reference maps corresponding to a plurality of suspicious behaviors;
and if the similarity analysis result represents that an activity track reference graph similar to the activity track graph exists in the activity track reference graph library, identifying that the activity object has suspicious behaviors corresponding to the activity track reference graph.
8. The method according to any one of claims 5 to 7, further comprising:
when detecting that the moving objects entering the target place within a third preset time period comprise a plurality of moving objects and only one registered entrance person of the target place is included in the plurality of moving objects, identifying the plurality of moving objects as abnormal entrance moving groups;
when the movable object is detected to be a registered entrance person of the target place and the activity track of the movable object in the target place is not monitored in the time period when the movable object is registered, the movable object is identified as an abnormal movable object.
9. A device for monitoring and analyzing the behavior of a venue activity object, comprising:
the face image receiving module is used for receiving the encrypted first face image from an Internet server of a specified Internet protocol address; the encrypted first face image is transmitted to the Internet server in a one-way mode after being encrypted by the place server; the place server is used for receiving first face images of moving objects moving in a target place, which are acquired in real time by image acquisition equipment from the image acquisition equipment deployed at a plurality of preset positions of the target place;
the face image comparison module is used for comparing the first face image obtained by decryption with a second face image in a pre-stored place identity library of the target place to obtain a first comparison result;
the first comparison result processing module is used for comparing the first face image with a third face image in a pre-stored global identity library to obtain a second comparison result if the first comparison result represents that the identity acquisition fails, and acquiring real-name authentication identity information aiming at the moving object according to the second comparison result;
the second comparison result processing module is used for acquiring the real-name authentication identity information aiming at the movable object according to the first comparison result if the first comparison result represents that the identity is successfully acquired;
and the behavior judgment module is used for acquiring multi-place activity track information of the activity object based on the real-name authentication identity information under the condition that the real-name authentication identity information represents that the activity object is not an practitioner of the target place, and judging whether the activity object has preset suspicious behaviors or not according to the basic activity track information of the activity object in the target place and the multi-place activity track information.
10. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 5 to 8 when executing the computer program.
CN202011107137.9A 2020-10-16 2020-10-16 Behavior monitoring and analyzing system, method, device and equipment for site activity object Active CN112016526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011107137.9A CN112016526B (en) 2020-10-16 2020-10-16 Behavior monitoring and analyzing system, method, device and equipment for site activity object

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011107137.9A CN112016526B (en) 2020-10-16 2020-10-16 Behavior monitoring and analyzing system, method, device and equipment for site activity object

Publications (2)

Publication Number Publication Date
CN112016526A CN112016526A (en) 2020-12-01
CN112016526B true CN112016526B (en) 2021-02-09

Family

ID=73527566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011107137.9A Active CN112016526B (en) 2020-10-16 2020-10-16 Behavior monitoring and analyzing system, method, device and equipment for site activity object

Country Status (1)

Country Link
CN (1) CN112016526B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113780115B (en) * 2021-08-25 2024-02-13 杭州海康威视系统技术有限公司 Abnormal personnel group analysis method and device, electronic equipment and storage medium
CN113704751B (en) * 2021-08-31 2022-03-29 山东中关创业信息科技股份有限公司 Vulnerability repairing method based on artificial intelligence decision and big data mining system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070036395A1 (en) * 2005-08-15 2007-02-15 Okun Sheri L Reverse identity profiling system with alert function
CN101534425A (en) * 2009-04-10 2009-09-16 上海伯里春贸易有限公司 System for acquiring, comparing, identifying and monitoring portrait at station, airdrome and metro, as well as method thereof
US11195057B2 (en) * 2014-03-18 2021-12-07 Z Advanced Computing, Inc. System and method for extremely efficient image and pattern recognition and artificial intelligence platform
US11748983B2 (en) * 2018-05-21 2023-09-05 3M Innovative Properties Company Image-based personal protective equipment fit system using worker-specific fit test image data
CN109740411A (en) * 2018-11-09 2019-05-10 南京大学 Intelligent monitor system, monitoring method based on recognition of face and quickly go out alarm method
CN111291596A (en) * 2018-12-07 2020-06-16 杭州海康威视数字技术股份有限公司 Early warning method and device based on face recognition
CN109558861A (en) * 2018-12-28 2019-04-02 上海依图网络科技有限公司 A kind of method and device of determining passerby track
CN110245630B (en) * 2019-06-18 2023-02-17 广东中安金狮科创有限公司 Monitoring data processing method and device and readable storage medium
CN110728252B (en) * 2019-10-22 2023-08-04 山西省信息产业技术研究院有限公司 Face detection method applied to regional personnel motion trail monitoring

Also Published As

Publication number Publication date
CN112016526A (en) 2020-12-01

Similar Documents

Publication Publication Date Title
US20160246981A1 (en) Data secrecy statistical processing system, server device for presenting statistical processing result, data input device, and program and method therefor
US20130108105A1 (en) Apparatus and method for masking privacy region based on monitored video image
CN112016526B (en) Behavior monitoring and analyzing system, method, device and equipment for site activity object
US9740846B2 (en) Controlling user access to electronic resources without password
CN112949545B (en) Method, apparatus, computing device and medium for recognizing face image
US9667919B2 (en) Method and system for anonymous video analytics processing
US11036998B2 (en) CCTV video smart surveillance system and method thereof
CN111815842A (en) Health information uplink method and device, storage medium and electronic device
US11520931B2 (en) Privacy masking method using format-preserving encryption in image security system and recording medium for performing same
CN108959884B (en) Human authentication verification device and method
KR102019362B1 (en) CCTV video data distribution processing device and method thereof
KR101951605B1 (en) Cctv image security system to prevent image leakage
Ruuhwan et al. Evaluation of integrated digital forensics investigation framework for the investigation of smartphones using soft system methodology
CN108932420B (en) Person certificate checking device, method and system and certificate deciphering device and method
CN112800454B (en) Case data processing method, related device and computer readable medium
CN113032755B (en) Nuclear power equipment operator verification method, device, equipment and storage medium
CN113052045B (en) Method, apparatus, computing device and medium for identifying finger vein image
JP5353147B2 (en) Face matching system
CN113052044A (en) Method, apparatus, computing device, and medium for recognizing iris image
CN111783594A (en) Alarm method and device and electronic equipment
KR102530406B1 (en) System and method for processing video data to protect personal information based on blockchain
US20220130174A1 (en) Image processing apparatus, control method, and non-transitory storage medium
CN113223654B (en) Intelligent reading management platform for medical examination report sheet
JP2019095872A (en) Search system, search device, terminal device, search method, and program
CN116456127B (en) Video processing system, method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant